The SCEAS System
| |||||||

## Search the dblp DataBase
Amr M. Youssef:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Amr M. Youssef, Guang Gong
**Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.**[Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:15-20 [Conf] - Amr M. Youssef, Guang Gong
**Hyper-bent Functions.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:406-419 [Conf] - Amr M. Youssef, Guang Gong
**On the Interpolation Attacks on Block Ciphers.**[Citation Graph (0, 0)][DBLP] FSE, 2000, pp:109-120 [Conf] - Amr M. Youssef, Guang Gong
**Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:214-222 [Conf] - Amr M. Youssef, Stafford E. Tavares
**Information Leakage of a Randomly Selected Boolean Function.**[Citation Graph (0, 0)][DBLP] Information Theory and Applications, 1995, pp:41-52 [Conf] - Guang Gong, Amr M. Youssef
**On Welch-Gong Transformation Sequence Generators.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:217-232 [Conf] - Amr M. Youssef
**Cryptanalysis of the ``Augmented Family of Cryptographic Parity Circuits'' Proposed at ISW'97.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:29-38 [Conf] - Amr M. Youssef, Guang Gong
**Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2001, pp:49-59 [Conf] - Amr M. Youssef, Stafford E. Tavares
**Affine equivalence in the AES round function.**[Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2005, v:148, n:2, pp:161-170 [Journal] - Amr M. Youssef, Stafford E. Tavares, Guang Gong
**On some probabilistic approximations for AES-like s-boxes.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2006, v:306, n:16, pp:2016-2020 [Journal] - Amr M. Youssef, Stafford E. Tavares
**Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1995, v:56, n:5, pp:249-252 [Journal] - Amr M. Youssef, Stafford E. Tavares
**Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion".**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1996, v:60, n:5, pp:271-275 [Journal] - Guang Gong, Amr M. Youssef
**Cryptographic properties of the Welch-Gong transformation sequence generators.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:11, pp:2837-2846 [Journal] - Z. Saber, Mohammad Faisal Uddin, Amr M. Youssef
**On the existence of (9, 3, 5, 240) resilient functions.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2269-2270 [Journal] - Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
**Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.**[Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:177-193 [Conf] - Ren Wang, Amr M. Youssef, Ahmed K. Elhakeem
**Artificial life feature selection techniques for spam e-mail filters.**[Citation Graph (0, 0)][DBLP] Computational Intelligence, 2006, pp:102-107 [Conf] - Ren Wang, Amr M. Youssef, Ahmed K. Elhakeem
**On Some Feature Selection Strategies for Spam Filter Design.**[Citation Graph (0, 0)][DBLP] CCECE, 2006, pp:2186-2189 [Conf] - Mohammad Faisal Uddin, Amr M. Youssef
**An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers.**[Citation Graph (0, 0)][DBLP] CCECE, 2006, pp:1582-1585 [Conf] **Differential Fault Analysis of Rabbit.**[Citation Graph (, )][DBLP]**Differential Fault Analysis of HC-128.**[Citation Graph (, )][DBLP]**A Related-Key Attack on TREYFER.**[Citation Graph (, )][DBLP]**A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing.**[Citation Graph (, )][DBLP]
Search in 0.018secs, Finished in 0.019secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |